• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 34,831
Next 10 →

Survey of Mobile Wireless Ad-Hoc Networks

by Stanley Kai, Him Chiu , 2005
"... Mobile wireless ad-hoc networks have recently become a popular research topic. They have been successfully deployed by groups such as the military, in which agents are all cooperative. However, civilian devices that utilize this technology are now becoming affordable and are very common. Mobile wire ..."
Abstract - Add to MetaCart
Mobile wireless ad-hoc networks have recently become a popular research topic. They have been successfully deployed by groups such as the military, in which agents are all cooperative. However, civilian devices that utilize this technology are now becoming affordable and are very common. Mobile

DEVS modeling of mobile wireless ad hoc networks

by Umar Farooq, Gabriel Wainer, Bengu Balya , 2007
"... Ad hoc networks are self-organizing wireless systems conformed by cooperating neighboring nodes that conform networks with variable topology. Analyzing these networks is a complex task due to their dynamic and irregular nature. Cellular Automata (CA), a very popular technique to study self-organizin ..."
Abstract - Cited by 6 (1 self) - Add to MetaCart
, and to execute them with high efficiency. We show how these techniques can be used to model mobile wireless ad hoc networks, making easy model definition, analysis and visualization of the results. The use of Cell-DEVS permitted us to easily develop new experiments, which allowed us to extend routing techniques

Link Stability in Mobile Wireless Ad Hoc Networks

by Michael Gerharz, Christian de Waal, Matthias Frank, Peter Martini - In Proceedings of the 27th Annual IEEE Conference on Local Computer Networks (LCN’02 , 2002
"... In this paper, we develop adaptive metrics to identify stable links in a mobile wireless networking environment based on the analysis of link durations in several different mobility scenarios. Our metrics only rely on online statistical evaluation of observed link durations. Neither do they require ..."
Abstract - Cited by 65 (1 self) - Add to MetaCart
In this paper, we develop adaptive metrics to identify stable links in a mobile wireless networking environment based on the analysis of link durations in several different mobility scenarios. Our metrics only rely on online statistical evaluation of observed link durations. Neither do they require

An Evaluation of Connectivity in Mobile Wireless Ad Hoc Networks

by Paolo Santi, Douglas M. Blough - DSN'02 , 2002
"... We consider the following problem for wireless ad hoc networks: assume n nodes, each capable of communicating with nodes within a radius of r, are distributed in a ddimensional region of side l; how large must the transmitting range r be to ensure that the resulting network is connected? We also con ..."
Abstract - Cited by 34 (4 self) - Add to MetaCart
We consider the following problem for wireless ad hoc networks: assume n nodes, each capable of communicating with nodes within a radius of r, are distributed in a ddimensional region of side l; how large must the transmitting range r be to ensure that the resulting network is connected? We also

Trusting the TrustModel in mobile wireless ad-hoc network settings

by Dagmara Spiewak, Thomas Engel - In the Proceedings of the 5th Int.Conf. on WSEAS INFORMATION SECURITY and PRIVACY (ISP’06 , 2006
"... Abstract:- Nowadays, the world gets more and more mobile in such a way that communication services are desirable anytime and anywhere. In this context, Mobile wireless ad-hoc networks, including mobile ad-hoc networks (MANETs) and Mesh-Networks, are systems of nodes that interconnect in a dynamical ..."
Abstract - Cited by 2 (1 self) - Add to MetaCart
Abstract:- Nowadays, the world gets more and more mobile in such a way that communication services are desirable anytime and anywhere. In this context, Mobile wireless ad-hoc networks, including mobile ad-hoc networks (MANETs) and Mesh-Networks, are systems of nodes that interconnect in a dynamical

Security Issues in Mobile (Wireless) Ad Hoc Networking

by Christopher Levari
"... Technology and communication have rapidly evolved over the last decade to permeate all facets of our lives. We now use technology in our homes, our work, and at play. With the advent of these devices to fulfill our need, we've discovered that we now want these de-vices to communicate and share ..."
Abstract - Add to MetaCart
our informa-tion. Since we are a mobile society, these communications need to be wireless. This need has helped expand the field of wireless ad hoc communications (networking). Ex-panding in parallel is the need to secure these communications and keep our data private. Security in ad hoc networks

2 Secure routing in mobile wireless ad hoc networks

by Siddhartha Gupte, Mukesh Singhal
"... 6 We discuss several well known contemporaryprotocols aimed at securing routing in mobile wireless ad hoc networks. 7 We analyze each of these protocols against requirements of ad hoc routing and in some cases identify fallibilities and 8 make recommendations to overcome these problems so as to impr ..."
Abstract - Add to MetaCart
6 We discuss several well known contemporaryprotocols aimed at securing routing in mobile wireless ad hoc networks. 7 We analyze each of these protocols against requirements of ad hoc routing and in some cases identify fallibilities and 8 make recommendations to overcome these problems so

Capacity deficit in mobile wireless ad hoc networks due to routing overheads

by Nabhendra Bisnik, Alhussein A. Abouzeid
"... Overheads incurred by routing protocols diminish the capacity available for relaying useful data in a mobile wireless ad hoc network. Discovering and understanding lower bounds on the amount of protocol overhead incurred for routing data packets is important for the development of efficient routing ..."
Abstract - Cited by 7 (1 self) - Add to MetaCart
Overheads incurred by routing protocols diminish the capacity available for relaying useful data in a mobile wireless ad hoc network. Discovering and understanding lower bounds on the amount of protocol overhead incurred for routing data packets is important for the development of efficient routing

Load Balanced Link Reversal Routing in Mobile Wireless Ad Hoc Networks

by Nabhendra Bisnik, Alhussein Abouzeid, Costas Busch
"... Link reversal routing ( LRR) is a local, distributed, and low-overhead technique used to maintain loop free routes in mobile wireless ad hoc networks. We explore the problem of load balancing the packet traffic in the network when using the LRR created routes. We study a fundamental LRR algorithm an ..."
Abstract - Add to MetaCart
Link reversal routing ( LRR) is a local, distributed, and low-overhead technique used to maintain loop free routes in mobile wireless ad hoc networks. We explore the problem of load balancing the packet traffic in the network when using the LRR created routes. We study a fundamental LRR algorithm

Mitigating the stochastic effects of fading in mobile wireless ad-hoc networks

by Ivan G. Guardiola , 2007
"... This research considers the impact of fast fading effects on the discovery and maintenance of communication routes in mobile wireless ad-hoc networks. Moreover, it is a upon this consideration that fast fading directly impacts the performance of the underlying communication protocols for such networ ..."
Abstract - Cited by 2 (2 self) - Add to MetaCart
This research considers the impact of fast fading effects on the discovery and maintenance of communication routes in mobile wireless ad-hoc networks. Moreover, it is a upon this consideration that fast fading directly impacts the performance of the underlying communication protocols
Next 10 →
Results 1 - 10 of 34,831
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University